Mitigating Threats and Security Metrics in Cloud Computing


Jayaprakash Kar, Manoj Ranjan Mishra, Journal of Information Processing Systems Vol. 12, No. 2, pp. 226-233, Jun. 2016  

10.3745/JIPS.03.0049
Keywords: Dynamic Access Control, Risk Assessment, Security Intelligence
Fulltext:

Abstract

Cloud computing is a distributed computing model that has lot of drawbacks and faces difficulties. Many new innovative and emerging techniques take advantage of its features. In this paper, we explore the security threats to and Risk Assessments for cloud computing, attack mitigation frameworks, and the risk-based dynamic access control for cloud computing. Common security threats to cloud computing have been explored and these threats are addressed through acceptable measures via governance and effective risk management using a tailored Security Risk Approach. Most existing Threat and Risk Assessment (TRA) schemes for cloud services use a converse thinking approach to develop theoretical solutions for minimizing the risk of security breaches at a minimal cost. In our study, we propose an improved Attack-Defense Tree mechanism designated as iADTree, for solving the TRA problem in cloud computing environments.


Statistics
Show / Hide Statistics

Statistics (Cumulative Counts from November 1st, 2017)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.




Cite this article
[APA Style]
Kar, J. & Mishra, M. (2016). Mitigating Threats and Security Metrics in Cloud Computing. Journal of Information Processing Systems, 12(2), 226-233. DOI: 10.3745/JIPS.03.0049.

[IEEE Style]
J. Kar and M. R. Mishra, "Mitigating Threats and Security Metrics in Cloud Computing," Journal of Information Processing Systems, vol. 12, no. 2, pp. 226-233, 2016. DOI: 10.3745/JIPS.03.0049.

[ACM Style]
Jayaprakash Kar and Manoj Ranjan Mishra. 2016. Mitigating Threats and Security Metrics in Cloud Computing. Journal of Information Processing Systems, 12, 2, (2016), 226-233. DOI: 10.3745/JIPS.03.0049.